Add Tests and Demos about "Sensitive Data Stored Unencrypted via Room" #3541
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
This PR closes #3448
##Summary
This PR introduces a new demo and finalizes the corresponding test for the MASVS-STORAGE requirement concerning unencrypted data persistence using the Room Library.
##Description
This submission specifically addresses data persistence via the Android Room Persistence Library by adding MASTG-DEMO-0070 and finalizing MASTG-TEST-0306.
The demo proves that sensitive PII (Email) and a secret (Access Token/Credential) are stored in plaintext within the default SQLite database created by Room. This is due to the lack of integration of an external encryption library (e.g., SQLCipher), confirming the weakness MASWE-0006.
The included run.sh script demonstrates the extraction of the Room database files from the app sandbox, allowing easy inspection of the sensitive contents in plaintext.
[x] I have read the contributing guidelines.